Analysis
-
max time kernel
142s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 06:45
Static task
static1
Behavioral task
behavioral1
Sample
d5cee0b3b0e031ded4023d079344e837_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d5cee0b3b0e031ded4023d079344e837_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d5cee0b3b0e031ded4023d079344e837_JaffaCakes118.exe
-
Size
18KB
-
MD5
d5cee0b3b0e031ded4023d079344e837
-
SHA1
e634db5fe88b1f594eac05ff43042ff4f6065d56
-
SHA256
2114ef225ab601983349812e63539a107e1521f9185ba6ef5184eff223232812
-
SHA512
44c142ecbe2e932dda5db0394cc48180a048c4ea98f5b9f94f4c55d07f7a04b00f5ddb4b7f3f81a9906fb4c695ac9fd5b39dce586dee067e12fe0fbde8a72652
-
SSDEEP
384:8dpo+gs7BEkAmMXTSy66wi/t7Qga4y3/nzBMPaNJawcudoD7UXh:cZgsdMmM26z7QgEnzPnbcuyD7UX
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" coiome.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation d5cee0b3b0e031ded4023d079344e837_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 1340 coiome.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\safe360 = "C:\\Program Files\\Common Files\\sfbsbvy\\coiome.exe" mshta.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Program Files directory 5 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\sfbsbvy d5cee0b3b0e031ded4023d079344e837_JaffaCakes118.exe File created C:\Program Files (x86)\IBK.hta d5cee0b3b0e031ded4023d079344e837_JaffaCakes118.exe File created C:\Program Files (x86)\Common Files\sfbsbvy\coiome.exe d5cee0b3b0e031ded4023d079344e837_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Common Files\sfbsbvy\coiome.exe d5cee0b3b0e031ded4023d079344e837_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Common Files\sfbsbvy coiome.exe -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1212 sc.exe 1624 sc.exe 5020 sc.exe 1220 sc.exe 2640 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 29 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5cee0b3b0e031ded4023d079344e837_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language coiome.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe -
Kills process with taskkill 3 IoCs
pid Process 4892 taskkill.exe 4352 taskkill.exe 1868 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "http://www.2345.com/?kkkbaidu" mshta.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\Main\default_page_url = "http://www.2345.com/?kkkbaidu" mshta.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.2345.com/?kkkbaidu" mshta.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000_Classes\Local Settings d5cee0b3b0e031ded4023d079344e837_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4972 d5cee0b3b0e031ded4023d079344e837_JaffaCakes118.exe Token: SeDebugPrivilege 4892 taskkill.exe Token: SeDebugPrivilege 1340 coiome.exe Token: SeDebugPrivilege 4352 taskkill.exe Token: SeDebugPrivilege 1868 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4972 wrote to memory of 2336 4972 d5cee0b3b0e031ded4023d079344e837_JaffaCakes118.exe 87 PID 4972 wrote to memory of 2336 4972 d5cee0b3b0e031ded4023d079344e837_JaffaCakes118.exe 87 PID 4972 wrote to memory of 2336 4972 d5cee0b3b0e031ded4023d079344e837_JaffaCakes118.exe 87 PID 4972 wrote to memory of 3052 4972 d5cee0b3b0e031ded4023d079344e837_JaffaCakes118.exe 89 PID 4972 wrote to memory of 3052 4972 d5cee0b3b0e031ded4023d079344e837_JaffaCakes118.exe 89 PID 4972 wrote to memory of 3052 4972 d5cee0b3b0e031ded4023d079344e837_JaffaCakes118.exe 89 PID 3052 wrote to memory of 4892 3052 cmd.exe 91 PID 3052 wrote to memory of 4892 3052 cmd.exe 91 PID 3052 wrote to memory of 4892 3052 cmd.exe 91 PID 4972 wrote to memory of 1340 4972 d5cee0b3b0e031ded4023d079344e837_JaffaCakes118.exe 100 PID 4972 wrote to memory of 1340 4972 d5cee0b3b0e031ded4023d079344e837_JaffaCakes118.exe 100 PID 4972 wrote to memory of 1340 4972 d5cee0b3b0e031ded4023d079344e837_JaffaCakes118.exe 100 PID 4972 wrote to memory of 1964 4972 d5cee0b3b0e031ded4023d079344e837_JaffaCakes118.exe 101 PID 4972 wrote to memory of 1964 4972 d5cee0b3b0e031ded4023d079344e837_JaffaCakes118.exe 101 PID 4972 wrote to memory of 1964 4972 d5cee0b3b0e031ded4023d079344e837_JaffaCakes118.exe 101 PID 1340 wrote to memory of 1588 1340 coiome.exe 103 PID 1340 wrote to memory of 1588 1340 coiome.exe 103 PID 1340 wrote to memory of 1588 1340 coiome.exe 103 PID 1340 wrote to memory of 4564 1340 coiome.exe 104 PID 1340 wrote to memory of 4564 1340 coiome.exe 104 PID 1340 wrote to memory of 4564 1340 coiome.exe 104 PID 4564 wrote to memory of 4352 4564 cmd.exe 107 PID 4564 wrote to memory of 4352 4564 cmd.exe 107 PID 4564 wrote to memory of 4352 4564 cmd.exe 107 PID 1588 wrote to memory of 1212 1588 cmd.exe 108 PID 1588 wrote to memory of 1212 1588 cmd.exe 108 PID 1588 wrote to memory of 1212 1588 cmd.exe 108 PID 1340 wrote to memory of 3612 1340 coiome.exe 109 PID 1340 wrote to memory of 3612 1340 coiome.exe 109 PID 1340 wrote to memory of 3612 1340 coiome.exe 109 PID 3612 wrote to memory of 1868 3612 cmd.exe 111 PID 3612 wrote to memory of 1868 3612 cmd.exe 111 PID 3612 wrote to memory of 1868 3612 cmd.exe 111 PID 1340 wrote to memory of 4948 1340 coiome.exe 113 PID 1340 wrote to memory of 4948 1340 coiome.exe 113 PID 1340 wrote to memory of 4948 1340 coiome.exe 113 PID 4948 wrote to memory of 1624 4948 cmd.exe 115 PID 4948 wrote to memory of 1624 4948 cmd.exe 115 PID 4948 wrote to memory of 1624 4948 cmd.exe 115 PID 1340 wrote to memory of 1548 1340 coiome.exe 116 PID 1340 wrote to memory of 1548 1340 coiome.exe 116 PID 1340 wrote to memory of 1548 1340 coiome.exe 116 PID 1340 wrote to memory of 4792 1340 coiome.exe 118 PID 1340 wrote to memory of 4792 1340 coiome.exe 118 PID 1340 wrote to memory of 4792 1340 coiome.exe 118 PID 1548 wrote to memory of 800 1548 cmd.exe 120 PID 1548 wrote to memory of 800 1548 cmd.exe 120 PID 1548 wrote to memory of 800 1548 cmd.exe 120 PID 4792 wrote to memory of 5020 4792 cmd.exe 121 PID 4792 wrote to memory of 5020 4792 cmd.exe 121 PID 4792 wrote to memory of 5020 4792 cmd.exe 121 PID 1340 wrote to memory of 4348 1340 coiome.exe 122 PID 1340 wrote to memory of 4348 1340 coiome.exe 122 PID 1340 wrote to memory of 4348 1340 coiome.exe 122 PID 4348 wrote to memory of 4968 4348 cmd.exe 124 PID 4348 wrote to memory of 4968 4348 cmd.exe 124 PID 4348 wrote to memory of 4968 4348 cmd.exe 124 PID 1340 wrote to memory of 3016 1340 coiome.exe 125 PID 1340 wrote to memory of 3016 1340 coiome.exe 125 PID 1340 wrote to memory of 3016 1340 coiome.exe 125 PID 1340 wrote to memory of 4132 1340 coiome.exe 127 PID 1340 wrote to memory of 4132 1340 coiome.exe 127 PID 1340 wrote to memory of 4132 1340 coiome.exe 127 PID 4132 wrote to memory of 1220 4132 cmd.exe 129 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 800 attrib.exe 4968 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5cee0b3b0e031ded4023d079344e837_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d5cee0b3b0e031ded4023d079344e837_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Program Files (x86)\IBK.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
PID:2336
-
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /im coiome.exe /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im coiome.exe /f3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4892
-
-
-
C:\Program Files (x86)\Common Files\sfbsbvy\coiome.exe"C:\Program Files (x86)\Common Files\sfbsbvy\coiome.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\SysWOW64\cmd.execmd /c sc delete JavaServe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\SysWOW64\sc.exesc delete JavaServe4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1212
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /im iejore.exe /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im iejore.exe /f4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4352
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /im conime.exe /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im conime.exe /f4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1868
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc stop LYTC3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\SysWOW64\sc.exesc stop LYTC4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1624
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -h -s -r -a "%userprofile%\Cookies\*.*"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\SysWOW64\attrib.exeattrib -h -s -r -a "C:\Users\Admin\Cookies\*.*"4⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:800
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete LYTC3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\SysWOW64\sc.exesc delete LYTC4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:5020
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c attrib -h -s -r -a "%userprofile%\Local Settings\Temp\Cookies\*.*"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Windows\SysWOW64\attrib.exeattrib -h -s -r -a "C:\Users\Admin\Local Settings\Temp\Cookies\*.*"4⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4968
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /s /q "%userprofile%\Cookies\*.*3⤵
- System Location Discovery: System Language Discovery
PID:3016
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc stop HidServ3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Windows\SysWOW64\sc.exesc stop HidServ4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1220
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /s /q "%userprofile%\Local Settings\Temporary Internet Files\*.*"3⤵
- System Location Discovery: System Language Discovery
PID:3952
-
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete HidServ3⤵
- System Location Discovery: System Language Discovery
PID:2884 -
C:\Windows\SysWOW64\sc.exesc delete HidServ4⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:2640
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /s /q "%userprofile%\Local Settings\Temp\Cookies\*.*"3⤵
- System Location Discovery: System Language Discovery
PID:804
-
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Documents and Settings\All Users\Application Data\Storm\update\%SESSIONNAME%\*.* /e /p everyone:n3⤵
- System Location Discovery: System Language Discovery
PID:840 -
C:\Windows\SysWOW64\cacls.execacls C:\Documents and Settings\All Users\Application Data\Storm\update\Console\*.* /e /p everyone:n4⤵
- System Location Discovery: System Language Discovery
PID:3372
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\d5cee0b3b0e031ded4023d079344e837_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1964
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Indicator Removal
1File Deletion
1Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5b1ab1f5f5d9e161060cde763cf1cda2a
SHA1a9f482ee7a1d9d0b91a3d88c476491d52449bae1
SHA256daabd72fba49ff4f9446e2391c3d2c36fb0787ac2a39a59646bfd7f91536feb1
SHA512c8d9e9716184858091a936b661193f51ed293a6d2427c59869ae83ee41c5be9a2d871b6f19df7d1bbfa2acd89f5af2673aaef616222de91393a75bf6e4a8c90b
-
Filesize
785B
MD574ccbce1e5800180a01fb299767e310c
SHA15eee44303a3800e0ac31a103538dccfe4ffa57b2
SHA2567c800551aa79c34f689c2d87e3b24c2bfaca0d2815538650abe445c3cb3a77ec
SHA512581385678a72de017f99b41d565d5acd8b2ffa322e20ae9489803b6043fe6696ccab38c43ae5583afda73cb3f33b4fa33813c543ffb4e34b17394d1ec6fae6c8